Network device inventory system

a network device and inventory system technology, applied in the field of distributed computer systems, can solve the problems of increased loss of connectivity, network damage and compromise of confidential data, and large networks without efficient knowing that all the devices on the network are functioning properly, so as to improve system integrity, reduce processing and memory requirements, and improve the effect of system integrity

Active Publication Date: 2008-02-28
WALMART APOLLO LLC
View PDF20 Cites 58 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0010]Benefits realized by embodiments include the generation of a complete inventory of devices, so that other tools may maintain and validate current antiviral software, for instance. Additionally, unknown or problematic devices may be identified and addressed appropriately to improve system integrity. New devices or changes to existing devices may be quickly updated, and all the above advantages may be accomplished automatically and transparently with minimal processing and memory requirements. Embodiments have particular application in the context of large and complex networks, for the purpose of dynamically and transparently discovering, inventorying and / or validating devices that may be attached to those networks. Desirable attributes may include scalability, unobtrusiveness and transparency.

Problems solved by technology

Delays in reacting to a failed or unauthorized network device can result in an increased loss of connectivity, network damage and compromise to confidential data, among other concerns.
Challenges associated with ensuring network integrity compound as the sizes of networks expand.
Large networks lack a mechanism for efficiently knowing that all of the devices on a network are functioning properly.
While discovery protocols have been developed to assist with identifying connected devices, many conventional discovery protocols also have the potential for causing software damage.
Other protocols may work on a small scale, however, they often do not scale well in a world-wide type network.
As such, there is no mechanism for dynamically tracking all devices on a network in a transparent, non-intrusive and non-damaging fashion.
Relatedly, no known protocol can effectively verify that identified devices are approved for use on a network.
Absent such detection processes, networks remain vulnerable to intrusion, compromise and damage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network device inventory system
  • Network device inventory system
  • Network device inventory system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023]An embodiment consistent with the invention identifies and validates network devices by actively crawling through networks to collect identifying data. The identifying data comprises information indicative of a particular device or network, e.g., “hints” comprising the type of port, traffic, protocol and / or operating system used by a device. Other identifying data may include a serial number or previously assigned identifier associated with the device. The embodiment correlates the determined identifying data to stored device information. In this manner, the identifying data may be matched in order to categorize a device as being either known or unknown. Unknown devices may then be evaluated to determine if they should be approved and cataloged, or disabled from the network.

[0024]To accomplish this network device validation, the embodiment shown in FIG. 1 relies on a distributed network inventory system 10 configured to identify, classify and / or validate network devices 16. Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A network device identification process and system where a centralized global master is coupled to multiple local masters that locally retain a portion of the data from the global master, and that coordinate the dynamic performance of discovery and identification processes within the domains assigned to those local masters. The processes identify and validate devices on the network.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application claims the benefit of the filing date of U.S. Provisional Patent Application No. 60 / 823,206, entitled “NETWORK DEVICE INVENTORY SYSTEM”, filed on Aug. 22, 2006 by Scott Halbert. The entire disclosure of that provisional U.S. patent application is incorporated into this application by reference.FIELD OF THE INVENTION[0002]The present invention generally relates to distributed computer systems, and more particularly, to managing computing resources within a distributed computer environment.BACKGROUND OF THE INVENTION[0003]Computer networking provides vital efficiency for private, government and commercial enterprises. Distributive computer networks can globally interconnect a virtually limitless number of electronic devices to facilitate efficient communications. To effectively manage devices and tasks within a network, distributive network operators must diligently work towards ensuring network integrity. For example, netw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L12/28
CPCH04L41/0213H04L41/12H04L41/046
Inventor HALBERT, SCOTT
Owner WALMART APOLLO LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products